The
Hidden
Threat:
How
Fake
Identities
Used
By
Remote
Employees
Put
Your
Business
At
Risk—And
How
To
Defend
Against
This
–
Above
the
Law
What
information
should
you
know?
In
general,
the
scheme
involves
the
use
of
deceptive
tactics,
including
stolen
identities
and
remote
access
technology
tools,
to
secure
IT
employee
or
contractor
positions
within
US-based
employers.
The
allure
of
high
pay
for
these
roles,
coupled
with
a
comparatively
low
risk
of
detection,
makes
this
scheme
particularly
enticing
for
DPRK
operatives.
The
US
Department
of
Justice
announced
in
a
recent
court-approved
seizure
action:1

What
can
you
do
with
this
information?
We
recommend
that
companies
mitigate
this
risk
by
using
a
risk-based
approach
to:
